Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h6c2-x2m2-mwhf | nginx-ui's Unauthenticated MCP Endpoint Allows Remote Nginx Takeover |
Thu, 16 Apr 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nginxui
Nginxui nginx Ui |
|
| CPEs | cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nginxui
Nginxui nginx Ui |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
0xjacky
0xjacky nginx-ui |
|
| Vendors & Products |
0xjacky
0xjacky nginx-ui |
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware treats as "allow all". This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover. At time of publication, there are no publicly available patches. | |
| Title | Nginx UI: Unauthenticated MCP Endpoint Allows Remote Nginx Takeover | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-16T21:42:59.787Z
Reserved: 2026-03-17T17:22:14.670Z
Link: CVE-2026-33032
Updated: 2026-04-16T21:42:59.787Z
Status : Modified
Published: 2026-03-30T18:16:19.410
Modified: 2026-04-16T22:16:37.433
Link: CVE-2026-33032
No data.
OpenCVE Enrichment
Updated: 2026-05-11T17:30:15Z
Github GHSA